Click to jump to signature section
Source: tiago.exe | ReversingLabs: Detection: 23% |
Source: tiago.exe | Static PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE |
Source: | Binary string: C:\rprichard\proj\winpty\src\Release\x64\winpty.pdb source: tiago.exe |
Source: | Binary string: C:\rprichard\proj\winpty\src\Release\x64\winpty-agent.pdb source: tiago.exe |
Source: unknown | TCP traffic detected without corresponding DNS query: 194.190.152.129 |
Source: unknown | TCP traffic detected without corresponding DNS query: 194.190.152.129 |
Source: unknown | TCP traffic detected without corresponding DNS query: 194.190.152.129 |
Source: unknown | TCP traffic detected without corresponding DNS query: 194.190.152.129 |
Source: unknown | TCP traffic detected without corresponding DNS query: 194.190.152.129 |
Source: unknown | TCP traffic detected without corresponding DNS query: 194.190.152.129 |
Source: unknown | TCP traffic detected without corresponding DNS query: 194.190.152.129 |
Source: unknown | TCP traffic detected without corresponding DNS query: 194.190.152.129 |
Source: unknown | TCP traffic detected without corresponding DNS query: 194.190.152.129 |
Source: unknown | TCP traffic detected without corresponding DNS query: 194.190.152.129 |
Source: unknown | TCP traffic detected without corresponding DNS query: 194.190.152.129 |
Source: unknown | TCP traffic detected without corresponding DNS query: 194.190.152.129 |
Source: unknown | TCP traffic detected without corresponding DNS query: 194.190.152.129 |
Source: unknown | TCP traffic detected without corresponding DNS query: 194.190.152.129 |
Source: unknown | TCP traffic detected without corresponding DNS query: 194.190.152.129 |
Source: unknown | TCP traffic detected without corresponding DNS query: 194.190.152.129 |
Source: unknown | TCP traffic detected without corresponding DNS query: 194.190.152.129 |
Source: unknown | TCP traffic detected without corresponding DNS query: 194.190.152.129 |
Source: unknown | TCP traffic detected without corresponding DNS query: 194.190.152.129 |
Source: unknown | TCP traffic detected without corresponding DNS query: 194.190.152.129 |
Source: unknown | TCP traffic detected without corresponding DNS query: 194.190.152.129 |
Source: unknown | TCP traffic detected without corresponding DNS query: 194.190.152.129 |
Source: unknown | TCP traffic detected without corresponding DNS query: 194.190.152.129 |
Source: unknown | TCP traffic detected without corresponding DNS query: 194.190.152.129 |
Source: unknown | TCP traffic detected without corresponding DNS query: 194.190.152.129 |
Source: unknown | TCP traffic detected without corresponding DNS query: 194.190.152.129 |
Source: unknown | TCP traffic detected without corresponding DNS query: 194.190.152.129 |
Source: unknown | TCP traffic detected without corresponding DNS query: 194.190.152.129 |
Source: unknown | TCP traffic detected without corresponding DNS query: 194.190.152.129 |
Source: unknown | TCP traffic detected without corresponding DNS query: 194.190.152.129 |
Source: unknown | TCP traffic detected without corresponding DNS query: 194.190.152.129 |
Source: unknown | TCP traffic detected without corresponding DNS query: 194.190.152.129 |
Source: unknown | TCP traffic detected without corresponding DNS query: 194.190.152.129 |
Source: unknown | TCP traffic detected without corresponding DNS query: 194.190.152.129 |
Source: unknown | TCP traffic detected without corresponding DNS query: 194.190.152.129 |
Source: unknown | TCP traffic detected without corresponding DNS query: 194.190.152.129 |
Source: unknown | TCP traffic detected without corresponding DNS query: 194.190.152.129 |
Source: unknown | TCP traffic detected without corresponding DNS query: 194.190.152.129 |
Source: unknown | TCP traffic detected without corresponding DNS query: 194.190.152.129 |
Source: unknown | TCP traffic detected without corresponding DNS query: 194.190.152.129 |
Source: unknown | TCP traffic detected without corresponding DNS query: 194.190.152.129 |
Source: unknown | TCP traffic detected without corresponding DNS query: 194.190.152.129 |
Source: unknown | TCP traffic detected without corresponding DNS query: 194.190.152.129 |
Source: unknown | TCP traffic detected without corresponding DNS query: 194.190.152.129 |
Source: C:\Users\user\Desktop\tiago.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\tiago.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Users\user\Desktop\tiago.exe | Section loaded: winmm.dll | Jump to behavior |
Source: C:\Users\user\Desktop\tiago.exe | Section loaded: powrprof.dll | Jump to behavior |
Source: C:\Users\user\Desktop\tiago.exe | Section loaded: umpdc.dll | Jump to behavior |
Source: C:\Users\user\Desktop\tiago.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Users\user\Desktop\tiago.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\tiago.exe | Section loaded: netapi32.dll | Jump to behavior |
Source: C:\Users\user\Desktop\tiago.exe | Section loaded: wkscli.dll | Jump to behavior |
Source: C:\Users\user\Desktop\tiago.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Users\user\Desktop\tiago.exe | Section loaded: samcli.dll | Jump to behavior |
Source: C:\Users\user\Desktop\tiago.exe | Section loaded: samlib.dll | Jump to behavior |
Source: C:\Users\user\Desktop\tiago.exe | Section loaded: mswsock.dll | Jump to behavior |
Source: classification engine | Classification label: mal64.troj.winEXE@2/1@0/1 |
Source: C:\Windows\System32\conhost.exe | Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6056:120:WilError_03 |
Source: C:\Users\user\Desktop\tiago.exe | File opened: C:\Windows\system32\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 | Jump to behavior |
Source: tiago.exe | Static PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
Source: C:\Users\user\Desktop\tiago.exe | Key opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers | Jump to behavior |
Source: tiago.exe | ReversingLabs: Detection: 23% |
Source: tiago.exe | String found in binary or memory: text= via %s zombie% CPU (, goid=, j0 = -NoLogo19531252.5.4.32.5.4.52.5.4.62.5.4.72.5.4.82.5.4.99765625: type ::ffff::method:scheme:statusACK badAddressAvestanBengaliBrailleCLOSINGCONNECTChanDirCopySidCreatedCypriotDeseretDstMaskEd25519ElbasanElymaicEnabledExpiresFATAL: ForkingFreeSidGODEBUGGranthaHEADERSHanunooHighRxtIM UsedINITIALIO waitJanuaryKannadaMD2-RSAMD5-RSAMUI_DltMUI_StdMakasarMandaicMarchenMaxCwndMaxSizeMultaniMyanmarNextHopNoRouteOctoberOsmanyaPATHEXTPayloadPktTypeRadicalRefererSHA-224SHA-256SHA-384SHA-512SegTimeSharadaShavianSiddhamSinhalaSleepExSndCwndSockErrSogdianSoyomboSrcMaskSubjectSwapperTagalogTibetanTimeoutTirhutaTrailerTuesdayTypeALLTypeOPTTypePTRTypeSOATypeSRVTypeTXTTypeWKSUNKNOWNUnknownUpgradeWARNINGWSARecvWSASendWarning\\.\UNCtypes value=abortedanswersarcfouravx512fbucketscharsetchtimeschunkedcmd.execommandconnectconsolecpuprofderiveddstAddrexpiresfailurefloat32float64forcegcgctracehandlerhead = headershttp://installinvalidipv4TOSipv4TTLlookup minpc= nil keyoptionsosxsavepacer: panic: rcvListreaddirrefererrefreshregularrssh://runningsendTOSserial:servicesessionsignal srcAddrssh-dssssh-rsasshtypesymlinksyscalltrailertupleIDuintptrunackedunknownupgradeusage: userMSSwaitingwindowswriteatwsarecvwsasendx64/xp/ bytes, data=%q etypes incr=%v is not maxpc= mcount= minLC= minutes nalloc= newval= nfreed= packed= ping=%q pointer stack=[ status %!Month(2.5.4.102.5.4.112.5.4.173des-cbc48828125AcceptExAcceptedArmenianAssignedBAD RANKBalineseBindAddrBopomofoBugineseCancelIoCherokeeClassANYConflictContinueCtrl + CCtrl + DCurveID(CyrillicDNS nameDSA-SHA1DecemberDenyTypeDisabledDuployanEqualSidEthiopicExtenderFebruaryFullPathGeorgianGoStringGujaratiGurmukhiHTTP/1.1HTTP/2.0HiraganaHopLimitHost: %sIsWindowJavaneseKatakanaKayah_LiL3HdrLenLAST-ACKLinear_ALinear_BLinkAddrLocationMD5+SHA1MahajaniMatchersNO_ERRORNO_PROXYNetProtoNovemberOffenderOl_ChikiOrigin: PRIORITYParseIntPhags_PaProtocolQuestionRTTStateReadFileReceivedReceiverRecentTSSETTINGSSHA1-RSASHA3-224SHA3-256SHA3-384SHA3-512SYN-RCVDSYN-SENTSaturdaySendTSOkSetEventSsthreshTSOffsetTagbanwaTai_ThamTai_VietThursdayTifinaghTimeoutsTypeAAAATypeAXFRUgariticWLastMaxWSAIoctlXmitTime[::1]:53[:word:][signal stack=[_gatewayacceptexaddress argumentavx512bwavx512cdavx512dqavx512eravx512pfavx512vlboundNICcapacitycgocheckconsumedcontinuecs deadlockdnatDoneerrQueueexecwaitexporterfile+netfinishedfs gs hijackedhost keyhttp/1.1if-matchif-rangeintervalinvalid ip4: |